نتایج جستجو برای: stet buffer
تعداد نتایج: 42947 فیلتر نتایج به سال:
Submicrometer‐thick AlGaN/GaN high‐electron‐mobility transistor (HEMT) epilayers grown on silicon substrate with a state‐of‐the art vertical buffer breakdown field as high 6 MV cm −1 enabling voltage of 250 V for short gate‐to‐drain distances despite such thin structure are reported. HEMTs gate length 100 nm exhibit good DC characteristics low drain‐induced barrier, going mV DS 30 V. Breakdown ...
Control-Flow Integrity (CFI) means that the execution of a program dynamically follows only certain paths, in accordance with a static policy. CFI can prevent attacks that, by exploiting buffer overflows and other vulnerabilities, attempt to control program behavior. This paper develops the basic theory that underlies two practical techniques for CFI enforcement, with precise formulations of hy...
At COLING80, we reported on an Interactive Translation System called ITS. We will discuss t h r ee p rob lems in the design of the first version of ITS: (1) human f ac to r s , (2) the "all or noth ing" syndrome, and (3) traditional centralized processing. We will also discuss a new vers ion of ITS, which is now being programmed. This new vers ion will hopeful ly o v e r c o m e these p rob lem...
Acknowledgements I would like to thank Sylvain Lefebvre for his help concerning the pBuffers and 3DSLib and other OpenGL questions. I would like to thank Gilles Debunne for libQGLViewer. Probably one of the most useful libraries available. I would like to thank Samuel Hornus for his comments and proof reading and Martin Eisemann for all his comments as well as Stephan Camerer for all the discus...
-Since the first buffer overflow problem occurred, many detection techniques have been presented. These techniques are effective in detecting most attacks, but some attacks still remain undetected. In order to be more effective, a memory-size-assisted buffer overflow detection(MBOD) is presented. The key feature of buffer overflow is that the size of the source memory is bigger than the size of...
Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...
This paper describes a CMOS analogy voltage supper buffer designed to have extremely low static current Consumption as well as high current drive capability. A new technique is used to reduce the leakage power of class-AB CMOS buffer circuits without affecting dynamic power dissipation. The name of applied technique is TRANSISTOR GATING TECHNIQUE, which gives the high speed buffer with the redu...
We used memory reference traces from a DEC Ultrix system running the X11 window system from MIT Project Athena and several freely available X11 applications to measure different aspects of memory system behavior and performance. Our measurements show that memory behavior for X11 workloads differs in several important ways from workloads more traditionally used in cache performance studies. User...
Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.
Translation Look-aside Buffer (TLB), which is small Content Addressable Memory (CAM) structure used to translate virtual addresses to physical addresses, can consume significant energy in some architectures. In addition, its power density is high, due to its small area. Consequently, reducing power consumption of TLB is important for both high-end and low-end systems. While a large TLB might be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید